- Metasploit Penetration Testing Cookbook
- Abhinav Singh
- 98字
- 2021-08-13 18:21:07
What you need for this book
To follow and recreate the recipes of this book, you will need two systems. One can be your pen-testing system and the other can be your target. Alternatively, you can also work with a single system and set up a penetration testing environment by using any virtualization software.
Apart from that you will require an ISO image of BackTrack 5 which has pre-installed Metasploit and other tools that we will be discussing in this book. Alternatively, you can download the Metasploit framework separately for your preferred operating system from its official website.
推薦閱讀
- SOA用戶指南
- 物聯(lián)網(wǎng)(IoT)基礎(chǔ):網(wǎng)絡(luò)技術(shù)+協(xié)議+用例
- 高校網(wǎng)絡(luò)道德教育研究
- 物聯(lián)網(wǎng)信息安全
- HCNA網(wǎng)絡(luò)技術(shù)
- 互聯(lián)網(wǎng)安全的40個(gè)智慧洞見:2015年中國互聯(lián)網(wǎng)安全大會(huì)文集
- NB-IoT物聯(lián)網(wǎng)技術(shù)解析與案例詳解
- Yii Application Development Cookbook(Second Edition)
- 物聯(lián)網(wǎng)長距離無線通信技術(shù)應(yīng)用與開發(fā)
- 物聯(lián)網(wǎng)工程概論
- 網(wǎng)絡(luò)綜合布線(第2版)
- 5G技術(shù)核心與增強(qiáng):從R15到R17
- 精通SEO:100%網(wǎng)站流量提升密碼
- Intelligent Mobile Projects with TensorFlow
- Learning Dart